HowTo: Allow-List CyberHoot’s AttackPhish Simulation Servers in M365
Related Articles
HowTo: Allow-List CyberHoot’s Mail-Relays in M365
High-Level Instructions: This HowTo video walks you through allow-listing CyberHoot’s Mail-Relay by either Domain Name or IP Addresses in Microsoft’s O365 environment. This process is very similar whether you use the domain names shown below or the ...
HowTo: Allow-List CyberHoot – Personal Gmail Account
If you sign up to receive CyberHoot BootCamp as an individual, you may need to allow-list the CyberHoot Domain in your own personal Gmail account. Here’s the instructions in a quick video for how to accomplish that. https://youtu.be/VzXBGn-g5eI ...
HowTo: Allow-List CyberHoot’s Domain Name and IP Addresses – Google Workspace
New CyberHoot businesses need to allow our training and phishing emails to reach their user’s inboxes directly. This article describes the two steps needed to make this happen. Note: If you wish to create an allow-list just for yourself personally ...
HowTo: Allow-List in MailProtector
This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end users using MailProtector. Warning: CyberHoot supports fake email Attack-Phishing for customers. Please keep in mind this approach uses ...
HowTo: Allow-list CyberHoot Phishing in AppRiver
How to Allow-list in AppRiver If you’re using AppRiver’s SpamLab spam filtering, you can add CyberHoot to your whitelist to ensure that our simulated phishing test emails and training notifications reach your end users without any problems. Here are ...